Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30/09/2024, 16:08
Static task
static1
Behavioral task
behavioral1
Sample
023348ca4e4f3ccf2383fbabde18ade2_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
023348ca4e4f3ccf2383fbabde18ade2_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
023348ca4e4f3ccf2383fbabde18ade2_JaffaCakes118.exe
-
Size
80KB
-
MD5
023348ca4e4f3ccf2383fbabde18ade2
-
SHA1
57b9fa02b972199eba688454bc8aea6232636c19
-
SHA256
de170410677cba3d0bfb2730d3a57698d145d746db9017a00d90f40c2d00ba62
-
SHA512
60b2dbb5b4f46e90aea5db7196596e443aa333adc315db400495effba9671cefc186742c1bf20c9c8f16f0c3b36d589ba82c3bac8770e817abdc4efd0a6efc29
-
SSDEEP
1536:UoQGmXxgtpRKZbKv8siTALAao/gBuH/tHsm:4/KpRTn72SM
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2508 cmd.exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 2136 tasklist.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 023348ca4e4f3ccf2383fbabde18ade2_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2136 tasklist.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1908 023348ca4e4f3ccf2383fbabde18ade2_JaffaCakes118.exe 1908 023348ca4e4f3ccf2383fbabde18ade2_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1908 wrote to memory of 2508 1908 023348ca4e4f3ccf2383fbabde18ade2_JaffaCakes118.exe 32 PID 1908 wrote to memory of 2508 1908 023348ca4e4f3ccf2383fbabde18ade2_JaffaCakes118.exe 32 PID 1908 wrote to memory of 2508 1908 023348ca4e4f3ccf2383fbabde18ade2_JaffaCakes118.exe 32 PID 1908 wrote to memory of 2508 1908 023348ca4e4f3ccf2383fbabde18ade2_JaffaCakes118.exe 32 PID 2508 wrote to memory of 2136 2508 cmd.exe 34 PID 2508 wrote to memory of 2136 2508 cmd.exe 34 PID 2508 wrote to memory of 2136 2508 cmd.exe 34 PID 2508 wrote to memory of 2136 2508 cmd.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\023348ca4e4f3ccf2383fbabde18ade2_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\023348ca4e4f3ccf2383fbabde18ade2_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c tasklist&&del 023348ca4e4f3ccf2383fbabde18ade2_JaffaCakes118.exe2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2136
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\PLSLTMYI\î'‚Jªè¨œå´¤_‚ªC&[1].htm
Filesize487B
MD5f828efced847ad087782e9e15ac0df42
SHA15008a757cec6fa198c44094b4cb4ae9472328295
SHA256e04d635aecd551123cfbe28fe303c2725187d95651e41642c6cf0cd2598d1528
SHA51221b1d5b5d84d7ec99e5f51d423f55b638f20600abc3a02c75cc14c75909b3442268589330ac71e83b9c16af5e6d9e6b46b76e675782f8bf47127ce17cb300d13